Andrew Orr's photo

Andrew Orr

Since 2015 Andrew has been writing about Apple, privacy, security, and at one point even Android. You can find him most places online under the username @andrewornot.

Get In Touch:

New App ‘Nanogram’ is a Telegram Client for Apple Watch

Nanogram is a brand new Apple Watch app that acts as a Telegram client. Features: Send, receive, and see all your messages & notifications right from your wrist – even when you don’t have your phone around. Experience the freedom of going truly phone-less with just your Apple Watch, while staying connected to your friends & family. Also supports FlickType Swipe Keyboard, for faster & more private replies on the go (vs Scribble & Dictation, respectively). Nanogram does not collect any information. Requires Apple Watch Series 3 or later, running watchOS 7 or later.

Mozilla VPN Expands to Seven More Countries, Increases Price

Mozilla has added seven additional countries to its VPN service, and raises the price for new users.

Mozilla’s virtual private network (VPN) service has arrived in seven more countries, including Austria, Belgium, France, Germany, Italy, Spain and Switzerland.

It will honor the $4.99 a month price for customers from the US, Canada, UK, Singapore, Malaysia, and New Zealand, who signed up already. But from now on that price will only be available for customers who sign up for a year. Otherwise the fee rises to $7.99 a month for a six month deal or $9.99 for a month of access.

Ukraine Authorities Seize Unencrypted Windscribe VPN Servers

VPN provider Windscribe said its servers were not encrypted, enabling authorities to create decoy servers and snoop on web traffic.

The Ontario, Canada-based company said earlier this month that two servers hosted in Ukraine were seized as part of an investigation into activity that had occurred a year earlier. The servers, which ran the OpenVPN virtual private network software, were also configured to use a setting that was deprecated in 2018 after security research revealed vulnerabilities that could allow adversaries to decrypt data.

Oh come on, VPN servers that weren’t encrypted?

Twitter Tests New ‘Shop Module’ Feature for iOS Users

Twitter is piloting a new feature on Wednesday called Shop Module. It will let brands add a shopping section at the top of their profiles. The pilot is currently limited to iOS devices for people who use the service in English.

The Shop Module is a dedicated space at the top of a profile where businesses can showcase their products. When people visit a profile with the Shop Module enabled, they can scroll through the carousel of products and tap through on a single product to learn more and purchase — seamlessly in an in-app browser, without having to leave Twitter.

Hackers Increasingly Using Discord to Spread Malware

Researchers found that hackers are turning to Discord to spread malware, such as password-hijacking and Discord chat bot APIs.

But the greatest percentage of the malware we found have a focus on credential and personal information theft, a wide variety of stealer malware as well as more versatile RATs. The threat actors behind these operations employed social engineering to spread credential-stealing malware, then use the victims’ harvested Discord credentials to target additional Discord users.

Oil Producer ‘Wesco’ Uses Excess Natural Gas to Mine Bitcoin

Utah-based oil company Wesco Operating Co. is using excess gas (natural, not Ethereum) to power a Bitcoin mining operation.

Rather than being “flared,” or burned, to eliminate it, the natural gas is burned to run electrical generators, which in turn power two mobile data centers that process Bitcoin transactions, Wesco representative Steve Degenfelder explained.

The company has connected with a Chicago-based firm, EZ Blockchain, to acquire the two Bitcoin “miners,” portable data processors tied to the Internet.

Researchers Hid Malware Inside an AI’s Brain

This is straight out of a sci-fi novel. Researchers created a proof-of-concept technique that let them hide malware inside of an AI’s neurons to avoid detection.

According to the paper, in this approach the malware is “disassembled” when embedded into the network’s neurons, and assembled into functioning malware by a malicious receiver program that can also be used to download the poisoned model via an update. The malware can still be stopped if the target device verifies the model before launching it, according to the paper. It can also be detected using “traditional methods” like static and dynamic analysis.